• Home
  • Webinars
  • Knowledge Partners
  • Experts
  • Become a Knowledge Partner
  • About
  • Contact
  • Webinars
  • Knowledge Partners
  • Experts
  • About
  • Contact

Home > Keynotes > Cyber Security > Page 3

Cyber Security

Cybersecurity challenges and solutions for implementing UN R155 and ISO/SAE 21434

November 23, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsTesting and Validation

Paul Wooderson of HORIBA MIRA discusses cybersecurity challenges and solutions when implementing the requirements of the new UNECE Regulation 155 and international standard ISO/SAE 21434.

Using digital twins for automated automotive cybersecurity testing

November 22, 2021
Connected VehiclesCyber SecurityDataSoftwareTesting and Validation

AVL’s Stefan Marksteiner and Cybellum’s Eyal Traitel explain how cyber digital twins can be automatically derived from automotive components and subsequently used to formulate security tests that verify their cybersecurity.

ECU design for functional safety, cybersecurity, and AUTOSAR™ compliance

November 17, 2021
Connected VehiclesCyber SecuritySoftwareStandards and RegulationsVehicle Safety

NXP experts explain why designing ECUs for functional safety, cybersecurity, and AUTOSAR compliance requires an understanding of the embedded hardware and software components available for implementation.

From in-vehicle intrusion detection to responsive attack prevention

November 12, 2021
Connected VehiclesCyber SecurityDataE/E ArchitectureSensorsSoftwareStandards and RegulationsWireless Networks

ESCRYPT’s Siddharth Shukla and Andreas Weber discuss different cyber attack prevention techniques and how to combine them with IDS sensors to protect the vehicle E/E architecture.

VSOC – cloud-based vehicle fleet security monitoring and response

October 28, 2021
Connected VehiclesCyber SecurityDataFleetsSoftwareStandards and Regulations

Experts from ESCRYPT explain why it is essential to use a combination of automated SIEM and human expert teams for fleet security monitoring.

Chinese automotive security regulations: how to build an integrated cybersecurity management system

October 18, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsTesting and Validation

Experts from ESCRYPT provide unique insight into automotive security regulations and standards in China, including MIIT’s critical upcoming regulation.

IDPS: a distributed system for cyber-attack detection and prevention in vehicles

October 12, 2021
Connected VehiclesCyber SecurityDataE/E ArchitectureSensorsSoftwareStandards and Regulations

ESCRYPT’s Jan Holle and Andreas Weber explain why distributed E/E architectures require a distributed IDPS that maps the specific protection needs of the vehicle systems.

A practical guide to fuzz testing embedded software in a CI pipeline

October 7, 2021
Connected VehiclesCyber SecurityDataPerception SystemsSensorsSoftwareTesting and ValidationWireless Networks

Dr. Dennis Kengo Oka outlines a practical step by step guide to building fuzz testing into the CI pipeline using the Zephyr Project RTOS as an example.

Applying real-world pen test lessons to UN-R155 cyber security compliance

September 14, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsTesting and Validation

SBD Automotive’s Jitesh Joshy and David McClure reveal how true success comes from marrying real-world pen test findings, deep threat modelling expertise, and insight into competitor adoption trends.

IDPS – the immune system for connected vehicle fleets

September 7, 2021
Connected VehiclesCyber SecurityDataFleetsSensorsSoftwareStandards and RegulationsWireless Networks

ESCRYPT experts discuss the global demands on the ESCRYPT Intrusion Detection and Prevention Solution (IDPS) and its several components based on a review of binding legislation.

An expert’s view on the challenges of UN-R 156 and ISO 24089

July 22, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and Regulations

EB experts discuss the latest UNECE regulations covering over-the-air software updates and explain how OEMs and suppliers can overcome evolving challenges to implement them successfully.

AUTOSAR for holistic vehicle protection

July 8, 2021
Connected VehiclesCyber SecurityDataSensorsSoftware

ESCRYPT’s Dr Michael Peter Schneider examines the security mechanisms included in the latest AUTOSAR releases and explains how they should be integrated into the Software Engineering Process.

Defence-in-depth by deploying hypervisors and secure coding techniques

June 30, 2021
Connected VehiclesCyber SecurityDataElectric Vehicle BatteryElectric Vehicle ChargingElectric VehiclesSoftware

Experts from OpenSynergy and LDRA discuss the inherent security of a virtualized architecture, and how that strength can be underpinned by applying secure development techniques to code that handles data passed between processes.

The impact of SUMS on OEMs and suppliers – how to prepare for UN-R 156 and ISO 24089

June 10, 2021
Connected VehiclesCyber SecuritySoftwareStandards and Regulations

ESCRYPT’s cybersecurity experts discuss the organizational processes that OEMs and suppliers must implement to comply with the latest software update delivery regulations.

The ABC of Intrusion Detection and Prevention Systems (IDPS) – Why you need them and how to evaluate them

April 27, 2021
Connected VehiclesCyber SecurityDataSoftwareTesting and ValidationVehicle Safety

Experts from Elektrobit and Argus Cyber Security explain the need for a secure architecture and how to enforce security zones with intrusion detection and prevention systems.

Using AUTOSAR to achieve UNECE-compliant cybersecurity

March 24, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and Regulations

Experts from ESCRYPT explain how and to what extent you can use the existing AUTOSAR security software to realize UNECE-compliant automotive cybersecurity.

How to bootstrap end-entity V2X devices

March 15, 2021
Connected VehiclesCyber SecurityDataIn-Vehicle InfotainmentSoftwareWireless Networks

ESCRYPT’s Omar Alshabibi explains how to bootstrap a V2X OBU or RSU at the manufacturing plant of an OEM or Tier 1 supplier in the most efficient way.

Structured automotive cybersecurity testing on an ethernet example

March 9, 2021
Connected VehiclesCyber SecurityDataStandards and RegulationsTesting and Validation

AVL’s Stefan Marksteiner and David Tromba explain how to structure cybersecurity testing in an automotive environment.

Automotive cybersecurity supplier governance with PROOF

March 3, 2021
Connected VehiclesCyber SecurityDataSoftwareStandards and RegulationsWireless Networks

Experts from ESCRYPT, KPMG, and Alyne discuss how to manage cybersecurity supplier governance effectively.

Intrusion detection for Ethernet-based E/E architecture

February 17, 2021
Connected VehiclesCyber SecurityDataE/E ArchitectureSoftwareStandards and RegulationsVehicle SafetyWireless Networks

ESCRYPT’s Dr. Eng. Siddharth Shukla provides insight into E/E architecture trends, focusing on the benefits and challenges of Ethernet in automotive E/E architectures.

  1. ←
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. →
  1. ←
  2. 1
  3. 2
  4. 3
  5. 4
  6. 5
  7. →
Mobex by Automotive World
1 – 3 The Washington Building
Stanwell Road
Penarth CF64 2AD
United Kingdom

Sign up for emails and never miss a webinar. Opt out or change your preferences at any time.

© Automotive World Ltd 2021. All rights reserved.

  • Become a Knowledge Partner
  • Terms and Conditions
  • Privacy Policy

Create a free account to view all
webinar videos and slide decks

Already have a Mobex account? .

* Required field

Hidden
Hidden

Which future mobility topics interest you most?

Which future mobility topics interest you most?

*
I want to receive emails regarding upcoming Mobex webinars.
I want to receive informative emails from third party Knowledge Partners whose presentations I view on this site.
This field is for validation purposes and should be left unchanged.

Log in to your account

Forgot password